2023
DOI: 10.34190/eccws.22.1.1204
|View full text |Cite
|
Sign up to set email alerts
|

Designing a high-fidelity testbed for 5G-based Industrial IoT

Abstract: With the rise of the Industrial IoT (Internet of Things) and Industry 4.0 paradigms, many control and sensor systems used for IACS (Industrial Automation and Control Systems) have become more complex, due to the increasing number of interconnected field devices, sensors and actuators often being geographically spread across large areas. Supporting these increasingly sophisticated networked scenarios calls for the involvement of telecommunications and utility providers to better support Machine-to-Machine (M2M)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 3 publications
0
0
0
Order By: Relevance
“…The traditional industry did not take security, especially system security, as part of the main design criterion at the beginning (Mi et al, 2021). As the development of ICS networking and information technology (Cruz et al, 2016) are developing, many security protection measures created by network isolation are increasingly being connected to the network, which may create the risk of exposing ICS security vulnerabilities to hackers (Babu et al, 2017), causing severe economic losses and negative social impact. Threats to asset security in ICS increase along with the level of asset complexity.…”
Section: Introductionmentioning
confidence: 99%
“…The traditional industry did not take security, especially system security, as part of the main design criterion at the beginning (Mi et al, 2021). As the development of ICS networking and information technology (Cruz et al, 2016) are developing, many security protection measures created by network isolation are increasingly being connected to the network, which may create the risk of exposing ICS security vulnerabilities to hackers (Babu et al, 2017), causing severe economic losses and negative social impact. Threats to asset security in ICS increase along with the level of asset complexity.…”
Section: Introductionmentioning
confidence: 99%